Skip to content
  • Hjem
  • Seneste
  • Etiketter
  • Populære
  • Verden
  • Bruger
  • Grupper
Temaer
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Kollaps
FARVEL BIG TECH
  1. Forside
  2. Ikke-kategoriseret
  3. Today in InfoSec Job Security News:

Today in InfoSec Job Security News:

Planlagt Fastgjort Låst Flyttet Ikke-kategoriseret
84 Indlæg 64 Posters 18 Visninger
  • Ældste til nyeste
  • Nyeste til ældste
  • Most Votes
Svar
  • Svar som emne
Login for at svare
Denne tråd er blevet slettet. Kun brugere med emne behandlings privilegier kan se den.
  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

    Today in InfoSec Job Security News:

    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

    thomasfuchs@hachyderm.ioT This user is from outside of this forum
    thomasfuchs@hachyderm.ioT This user is from outside of this forum
    thomasfuchs@hachyderm.io
    wrote sidst redigeret af
    #18

    @GossiTheDog you're just jealous because it will cure cancer and fix climate change

    fennix@infosec.spaceF 1 Reply Last reply
    0
    • da_667@infosec.exchangeD da_667@infosec.exchange

      @GossiTheDog ladies and gentlemen, it's this stupid shit (tm) that we are paying up the ass for new SSDs and RAM for.

      drat@infosec.exchangeD This user is from outside of this forum
      drat@infosec.exchangeD This user is from outside of this forum
      drat@infosec.exchange
      wrote sidst redigeret af
      #19

      @da_667 @GossiTheDog There's not enough press on the downstream effects this stupid shit (tm) causes for any non-giant corp including those kids trying to build home labs to learn (like mine).

      1 Reply Last reply
      0
      • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

        Today in InfoSec Job Security News:

        I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

        So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

        https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

        As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

        ectopod@hachyderm.ioE This user is from outside of this forum
        ectopod@hachyderm.ioE This user is from outside of this forum
        ectopod@hachyderm.io
        wrote sidst redigeret af
        #20

        @GossiTheDog was it Next.js?

        1 Reply Last reply
        0
        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

          Today in InfoSec Job Security News:

          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

          etchedpixels@mastodon.socialE This user is from outside of this forum
          etchedpixels@mastodon.socialE This user is from outside of this forum
          etchedpixels@mastodon.social
          wrote sidst redigeret af
          #21

          @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

          ptesarik@infosec.exchangeP tarheel@mstdn.ioT 2 Replies Last reply
          0
          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

            Today in InfoSec Job Security News:

            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

            hughsie@mastodon.socialH This user is from outside of this forum
            hughsie@mastodon.socialH This user is from outside of this forum
            hughsie@mastodon.social
            wrote sidst redigeret af
            #22

            @GossiTheDog I guess the AI security scanners will clean this up with their automated scan and CVE requests.</joke>

            joshbressers@infosec.exchangeJ 1 Reply Last reply
            0
            • da_667@infosec.exchangeD da_667@infosec.exchange

              @GossiTheDog what's funny to me, is that there were influencers on linkedin a few days ago claiming claudecode could find vulnerabilities in code faster than humans, and they're like "look at all these openssl vulns it found!" now I'm like. "well no shit its finding vulnerabilities, when its the one introducing them."

              badsamurai@infosec.exchangeB This user is from outside of this forum
              badsamurai@infosec.exchangeB This user is from outside of this forum
              badsamurai@infosec.exchange
              wrote sidst redigeret af
              #23

              @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

              Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

              That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

              @GossiTheDog

              draeath@infosec.exchangeD iagox86@infosec.exchangeI 2 Replies Last reply
              0
              • cr0w@infosec.exchangeC cr0w@infosec.exchange

                @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                fennix@infosec.spaceF This user is from outside of this forum
                fennix@infosec.spaceF This user is from outside of this forum
                fennix@infosec.space
                wrote sidst redigeret af
                #24

                @cR0w @GossiTheDog

                1 Reply Last reply
                0
                • drat@infosec.exchangeD drat@infosec.exchange

                  @da_667 @GossiTheDog I wish that juice actually existed...

                  draeath@infosec.exchangeD This user is from outside of this forum
                  draeath@infosec.exchangeD This user is from outside of this forum
                  draeath@infosec.exchange
                  wrote sidst redigeret af
                  #25

                  @Drat @da_667 @GossiTheDog drink enough ethanol and you'll accomplish it!

                  1 Reply Last reply
                  0
                  • thomasfuchs@hachyderm.ioT thomasfuchs@hachyderm.io

                    @GossiTheDog you're just jealous because it will cure cancer and fix climate change

                    fennix@infosec.spaceF This user is from outside of this forum
                    fennix@infosec.spaceF This user is from outside of this forum
                    fennix@infosec.space
                    wrote sidst redigeret af
                    #26

                    @thomasfuchs @GossiTheDog

                    I mean, if climate change becomes fixed eventually there won't be any more cancer, so they aren't completely wrong.

                    1 Reply Last reply
                    0
                    • badsamurai@infosec.exchangeB badsamurai@infosec.exchange

                      @da_667 I demoed that very thing recently. Prompted up a form page and visually I could see a handful of basic JavaScript issues.

                      Ask Claude to review the code it generated for vulns using OWASP Top 10. And it finds them.

                      That’s just bonkers. Sure, a lazy initial prompt so it’s all my fault, really.

                      @GossiTheDog

                      draeath@infosec.exchangeD This user is from outside of this forum
                      draeath@infosec.exchangeD This user is from outside of this forum
                      draeath@infosec.exchange
                      wrote sidst redigeret af
                      #27

                      @badsamurai @da_667 @GossiTheDog I've seen setups that run tests and such all in a closed loop, I suppose if one really wanted to "use" this shit, they could implement that sort of thing too.

                      It'll cause a shedload more token use (and electrical waste) but might mitigate some of the idiocy.

                      badsamurai@infosec.exchangeB 1 Reply Last reply
                      0
                      • cr0w@infosec.exchangeC cr0w@infosec.exchange

                        @GossiTheDog If only a significant number of security practitioners could have seen it coming and warned people.

                        alan@mindly.socialA This user is from outside of this forum
                        alan@mindly.socialA This user is from outside of this forum
                        alan@mindly.social
                        wrote sidst redigeret af
                        #28

                        @cR0w @GossiTheDog Where "a sufficient number" is defined as 125% of all existing and future security practitioners, certified or not.

                        1 Reply Last reply
                        0
                        • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                          @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                          draeath@infosec.exchangeD This user is from outside of this forum
                          draeath@infosec.exchangeD This user is from outside of this forum
                          draeath@infosec.exchange
                          wrote sidst redigeret af
                          #29

                          @nihkeys @DJGummikuh @GossiTheDog I don't think that phrase allows for incompetency in design. The purpose is what was intended, not what actually results. There is a distinction.

                          confuseacat@mastodon.socialC azuaron@cyberpunk.lolA 2 Replies Last reply
                          0
                          • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                            Today in InfoSec Job Security News:

                            I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                            So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                            https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                            As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                            dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                            dlakelan@mastodon.sdf.orgD This user is from outside of this forum
                            dlakelan@mastodon.sdf.org
                            wrote sidst redigeret af
                            #30

                            @GossiTheDog
                            The real question is why does a bot have commit privileges on a "major web framework"?

                            i mean the answer is probably because google owns the repo probably... but why?

                            1 Reply Last reply
                            0
                            • s_bergmann@chaos.socialS s_bergmann@chaos.social

                              @GossiTheDog It is interesting that these changes are attributed to a "user named Claude" and not to the "human using the agent named Claude". This is how diffusion of responsibility works, I guess.

                              draeath@infosec.exchangeD This user is from outside of this forum
                              draeath@infosec.exchangeD This user is from outside of this forum
                              draeath@infosec.exchange
                              wrote sidst redigeret af
                              #31

                              @s_bergmann @GossiTheDog I like how AIDER uses co-authors, so you can't escape from blame. All these tools should be doing similar!

                              1 Reply Last reply
                              0
                              • nihkeys@mastodontti.fiN nihkeys@mastodontti.fi

                                @DJGummikuh @GossiTheDog The purpose of a system is what it does. IMO these are not accidents.

                                violetmadder@kolektiva.socialV This user is from outside of this forum
                                violetmadder@kolektiva.socialV This user is from outside of this forum
                                violetmadder@kolektiva.social
                                wrote sidst redigeret af
                                #32

                                @nihkeys @DJGummikuh @GossiTheDog

                                The damage is the point.

                                It's a weapon.

                                Not sure I'd call it a "targeted" attack, when the goal is to flood absolutely EVERYTHING with shit everywhere.

                                1 Reply Last reply
                                0
                                • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                  Today in InfoSec Job Security News:

                                  I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                  So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                  https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                  As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                  ftp_alun@infosec.exchangeF This user is from outside of this forum
                                  ftp_alun@infosec.exchangeF This user is from outside of this forum
                                  ftp_alun@infosec.exchange
                                  wrote sidst redigeret af
                                  #33

                                  @GossiTheDog fault injection into production code at scale. Nice.

                                  1 Reply Last reply
                                  0
                                  • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                    Today in InfoSec Job Security News:

                                    I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                    So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                    https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                    As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                    spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                    spinnyspinlock@infosec.exchangeS This user is from outside of this forum
                                    spinnyspinlock@infosec.exchange
                                    wrote sidst redigeret af
                                    #34

                                    @GossiTheDog I became used to checking projects I am checking out for claude (etc) in the source files and commits really fast

                                    trivernis@social.funkyfish.coolT 1 Reply Last reply
                                    0
                                    • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                                      @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                                      ptesarik@infosec.exchangeP This user is from outside of this forum
                                      ptesarik@infosec.exchangeP This user is from outside of this forum
                                      ptesarik@infosec.exchange
                                      wrote sidst redigeret af
                                      #35

                                      @etchedpixels Bug bounties? You know nothing about business…
                                      You set up a giant scam tool, let venture capital pay for its development, then use it to hack the world and sell all of it:

                                      • license use of the tool,
                                      • hacking applications,
                                      • vulnerability scanning,
                                      • protection racket from affected companies.

                                      That' how real capitalists do business.
                                      The tool is called Claude.
                                      @GossiTheDog

                                      1 Reply Last reply
                                      0
                                      • etchedpixels@mastodon.socialE etchedpixels@mastodon.social

                                        @GossiTheDog So you are saying there is a business opportunity following claude around projects with bug bounties 😎

                                        tarheel@mstdn.ioT This user is from outside of this forum
                                        tarheel@mstdn.ioT This user is from outside of this forum
                                        tarheel@mstdn.io
                                        wrote sidst redigeret af
                                        #36

                                        @etchedpixels @GossiTheDog

                                        Gahhh. Takes a little effort to imagine LESS rewarding work.

                                        1 Reply Last reply
                                        0
                                        • gossithedog@cyberplace.socialG gossithedog@cyberplace.social

                                          Today in InfoSec Job Security News:

                                          I was looking into an obvious ../.. vulnerability introduced into a major web framework today, and it was committed by username Claude on GitHub. Vibe coded, basically.

                                          So I started looking through Claude commits on GitHub, there’s over 2m of them and it’s about 5% of all open source code this month.

                                          https://github.com/search?q=author%3Aclaude&type=commits&s=author-date&o=desc

                                          As I looked through the code I saw the same class of vulns being introduced over, and over, again - several a minute.

                                          keith_lawson@mastodon.socialK This user is from outside of this forum
                                          keith_lawson@mastodon.socialK This user is from outside of this forum
                                          keith_lawson@mastodon.social
                                          wrote sidst redigeret af
                                          #37

                                          @GossiTheDog This was literally the first major security mistake I made in my early days as a Perl developer and I don't imagine it's that uncommon. Claude has probably been trained with a truckload of code with these vulnerabilities.

                                          That's okay because we run everything in single-purpose Docker containers now though, right? /s

                                          n1xnx@tilde.zoneN 1 Reply Last reply
                                          0
                                          Svar
                                          • Svar som emne
                                          Login for at svare
                                          • Ældste til nyeste
                                          • Nyeste til ældste
                                          • Most Votes


                                          • Log ind

                                          • Har du ikke en konto? Tilmeld

                                          • Login or register to search.
                                          Powered by NodeBB Contributors
                                          Graciously hosted by data.coop
                                          • First post
                                            Last post
                                          0
                                          • Hjem
                                          • Seneste
                                          • Etiketter
                                          • Populære
                                          • Verden
                                          • Bruger
                                          • Grupper